[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1496254013-18719-1-git-send-email-chenbofeng.kernel@gmail.com>
Date: Wed, 31 May 2017 11:06:52 -0700
From: Chenbo Feng <chenbofeng.kernel@...il.com>
To: netdev@...r.kernel.org, David Miller <davem@...emloft.net>
Cc: Lorenzo Colitti <lorenzo@...gle.com>,
Chenbo Feng <fengc@...gle.com>
Subject: [PATCH net-next 1/2] bpf: Allow CGROUP_SKB eBPF program to access sk_buff
From: Chenbo Feng <fengc@...gle.com>
This allows cgroup eBPF program to classify packet based on their
protocol or other detail information. Currently program need
CAP_NET_ADMIN privilege to attach a cgroup eBPF program, and A
process with CAP_NET_ADMIN can already see all packets on the system,
for example, by creating an iptables rules that causes the packet to
be passed to userspace via NFLOG.
Signed-off-by: Chenbo Feng <fengc@...gle.com>
---
kernel/bpf/verifier.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c
index 339c8a1..94a9bc9 100644
--- a/kernel/bpf/verifier.c
+++ b/kernel/bpf/verifier.c
@@ -2419,6 +2419,7 @@ static bool may_access_skb(enum bpf_prog_type type)
case BPF_PROG_TYPE_SOCKET_FILTER:
case BPF_PROG_TYPE_SCHED_CLS:
case BPF_PROG_TYPE_SCHED_ACT:
+ case BPF_PROG_TYPE_CGROUP_SKB:
return true;
default:
return false;
--
2.7.4
Powered by blists - more mailing lists